publication . Article . 2009

Communication-efficient three-party protocols for authentication and key agreement

Lee, Tian-Fu; Liu, Jenn-Long; Sung, Mei-Jiun; Yang, Shiueng-Bien; Chen, Chia-Mei;
Restricted
  • Published: 01 Aug 2009 Journal: Computers & Mathematics with Applications, volume 58, pages 641-648 (issn: 0898-1221, Copyright policy)
  • Publisher: Elsevier BV
Abstract
AbstractEncrypted key exchange (EKE) authentication approaches are very important for secure communicating over public networks. In order to solve the security weaknesses three-party EKE, Yeh et al. [H.T. Yeh, H.M. Sun, T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks, Information Science and Engineering 19 (6) (2003) 1059–1070.] proposed two secure and efficient three-party EKE protocols. Based on the protocol developed by Yeh et al., two improved EKE protocols for authentication and key agreement are proposed in this study. The computational costs of the proposed protocols are the same as those o...
Subjects
free text keywords: Modelling and Simulation, Computational Theory and Mathematics, Computational Mathematics, AKA, Information science, Encrypted key exchange, Computer network, business.industry, business, Network communication, Diffie–Hellman key exchange, Authentication, Password cracking, Mathematics, Computer security, computer.software_genre, computer, Key agreement, EKE, Diffie–Hellman
Related Organizations
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue